Unlock instant, AI-driven research and patent intelligence for your innovation.

Port authentication method of authentication server, server, switch and storage medium

A technology of authentication server and port authentication, applied in the port authentication method of authentication server, server, switch and storage medium field, can solve problems such as security risks, and achieve the effect of reducing the possibility of security risks

Active Publication Date: 2021-07-16
北京东土军悦科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the authentication server does not authenticate the agent (that is, the switch directly connected to the authentication server). In this case, the network port of the authentication server is not controlled, and any network device connected to the network port can access Authentication server, so there are certain security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Port authentication method of authentication server, server, switch and storage medium
  • Port authentication method of authentication server, server, switch and storage medium
  • Port authentication method of authentication server, server, switch and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0079] figure 2 It is a flow chart of the port authentication method of the authentication server provided in Embodiment 1 of the present invention, image 3 It is a schematic diagram of the network topology structure of the existing authentication server directly connected to the switch, such as image 3 As shown, if the switch is directly connected to the authentication server, the switch, as the applicant, requests the authentication server to open the port directly connected to the switch on the authentication server, and the authentication server also acts as an agent in this process. Once the authentication server passes its authentication, the switch as the applicant will be upgraded to an authentication device and provide an agent for other switches that need authentication. At this time, the network topology becomes figure 1 As shown in the structure, the switch is upgraded to figure 1 The second switch in acts as a proxy, and the other switches are equivalent to ...

Embodiment 2

[0100] Figure 4 It is a flow chart of the port authentication method of the authentication server provided in Embodiment 2 of the present invention, such as image 3 As shown, if the switch is directly connected to the authentication server, the switch, as the applicant, requests the authentication server to open the port directly connected to the switch on the authentication server, and the authentication server also acts as an agent in this process. Once the authentication server passes its authentication, the switch as the applicant will be upgraded to an authentication device and provide an agent for other switches that need authentication. At this time, the network topology becomes figure 1 As shown in the structure, the switch is upgraded to figure 1 The second switch in acts as a proxy, and the other switches are equivalent to figure 1 The first switch in the network acts as the applicant, and the first switch applies to the authentication server to join the network ...

Embodiment 3

[0108] Figure 5 For the schematic diagram of the composition structure of the network topology provided by Embodiment 3 of the present invention, refer to Figure 5 According to the above network topology, a total of 4 authentication servers are used. In order to ensure the security of the network, the authentication server enables the port authentication function. The directly connected switches include 0-0, 1-0, 2-0, 3-0, These switches need to initiate authentication as applicants to their directly connected authentication servers to open the ports directly connected to the authentication server. If the authentication passes, switches 0-0, 1-0, 2-0, and 3-0 are upgraded to agents Or, and the switch or terminal connected to the switch 0-0, 1-0, 2-0, 3-0 respectively can be used as a new applicant to request to join the agent's network. If the authentication fails, any one connected to it will The switch cannot access the network, and the terminals cannot communicate with e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a port authentication method of an authentication server, a server, a switch and a storage medium. The port authentication method of the authentication server is applicable to the scene where the switch applies to the authentication server for opening the port directly connected to the switch on the authentication server. Request message for configuration information; the authentication server receives the configuration response message of the switch, and the configuration response message includes the configuration information obtained by the switch based on the query message; the authentication server matches the configuration information with the set switch configuration information, and when the matching After success, enable the port directly connected to the switch. The embodiment of the present invention ensures that the switch to be the agent works according to the configuration set by the authentication server, effectively reducing the possibility of potential safety hazards caused by configuration information tampering.

Description

technical field [0001] The embodiment of the present invention relates to network communication technology, in particular to a port authentication method of an authentication server, a server, a switch and a storage medium. Background technique [0002] The trusted switching network system requires each access user to perform authentication and control to ensure the trusted relationship and control between communication entities. For the existing terminal equipment, the existing Institute of Electrical and Electronics Engineers (Institute of Electrical and Electronics Engineers, IEEE for short) 802.1x protocol has been standardized and implemented. The IEEE802.1x protocol is called a port-based access control protocol. Its main purpose is to solve the problem of access authentication of wireless LAN users, to receive legal user input, and to protect network security. [0003] figure 1 It is a schematic diagram of the composition and structure of the existing IEEE802.1x cer...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0876H04L63/102
Inventor 王立文郭冰
Owner 北京东土军悦科技有限公司